Sciweavers

1247 search results - page 198 / 250
» Designing Secure Wireless Mobile Ad Hoc Networks
Sort
View
ADHOC
2007
104views more  ADHOC 2007»
14 years 10 months ago
An overlay approach to data security in ad-hoc networks
While it has been argued that application-layer overlay protocols can enhance services in mobile ad-hoc networks, hardly any empirical data is available on the throughput and dela...
Jörg Liebeherr, Guangyu Dong
DPD
2007
100views more  DPD 2007»
14 years 9 months ago
Managing real-time database transactions in mobile ad-hoc networks
In a mobile ad-hoc network (MANET), mobile hosts can move freely and communicate with each other directly through a wireless medium without the existence of a fixed wired infrastr...
Le Gruenwald, Shankar M. Banik, Chuo N. Lau
DATE
2006
IEEE
352views Hardware» more  DATE 2006»
15 years 3 months ago
Fast-prototyping using the BTnode platform
The BTnode platform is a versatile and flexible platform for functional prototyping of ad hoc and sensor networks. Based on an Atmel microcontroller, a Bluetooth radio and a low-...
Jan Beutel
AINTEC
2007
Springer
15 years 4 months ago
A Real-Time Performance-Monitoring Tool for Emergency Networks
Abstract. Emergency networks normally operate under highly unpredictable wireless environment and hence real time performance information holds a great significance that cannot be...
Shuprabha Shakya, Mohammad Abdul Awal, Dwijendra K...
ICPPW
2003
IEEE
15 years 3 months ago
Perfect Secrecy in Wireless Networks
In a classic paper, among a multitude of other security issues, Claude E. Shannon defined perfect secrecy for a pair of secure computers communicating over an insecure link. The ...
Phillip G. Bradford, Olga V. Gavrylyako, Randy K. ...